Don't forget to disclose in writing at the close of a consulting engagement key issues, such as the data you collected, so your access to sensitive resources is suspended.
Any quick review of a business IT site will yield a wealth of information about the steps in-house IT teams should take to lock down access to key resources when an employee leaves the company. But at SMB and SOHO operations, there may not be an in-house IT team to enact such steps. In fact, as consultant, you may be the closest thing to an IT department such a business has had for the last several months. As you close out your engagement, who will ensure that your access to sensitive resources, systems, and data is suspended? For consultants working with SMBs, it's often best if you take the reins.
When I close out a contract, I send the COO/business manager of the SMB client (usually, the person who signs the checks) a friendly reminder of the data I have collected over the term of the engagement; a list of the systems I still have access to; and suggestions as to how to "turn me off." Obviously, you don't want to appear standoffish in this communication, so include language like "standard operating procedure" and "housekeeping" to make it clear that you are looking out for the client's best interest.
This may seem like overkill, but I have been amazed at how wide-open some small businesses leave themselves. A recent client had parted ways on bad terms with their contract site developer, and yet this person's Admin account was still active after more than a year. Fortunately (and this will usually be the case), no one acted unprofessionally in this instance, but you never know. And while this scenario may seem nuts to an IT professional, locking down asset access — particularly if you are parting ways on good terms — is among the last thing on an SMB manager's mind.
As you communicate your close-out suggestions to a client, remember that the shortcuts many SMBs and SOHO shops take on the front end of their IT setup can make turning off a user something of a hassle. Without role- or user-based access, blocking you from the network can mean changing an AP password and disseminating that information to 10 or 20 users. They may just not do it.
So, what do you get out of this little exercise? Again, "housekeeping." There's a virtue in doing things correctly, and full disclosure like this builds credibility for your brand. And in many cases it can spare you an occasional frantic mail from a former client trying to figure out what happened to their MailChimp campaign you used to manage.
Here's a quick overview of items I include in my systems close-out email:
- Any potential valuable data of which I have local copies. This can range from exports of email mailing lists to internal business process schematics. Even if you have not signed a nondisclosure agreement (Chip Camden offers great advice about NDAs), I think it's best to remind the client of any data of which you have made copies, along with assurances that you have disposed of those copies. I usually send along copies of said data back to the client (they usually underlie some clumsy analysis, anyway) to be on the safe side.
- Any network access/passwords you hold. Again, experience tells me that this may well not get resolved (I have access to about 30 or so "private" SOHO networks around town), but still do make a note of it to your client, particularly if they have a simple file server or other shared resource.
- Cloud services. Most cloud services (including those offered by Google) have simple-enough account management, and your client should be able to drop you from an internal email or file-sharing account easily enough. Others have inexplicably drug their feet on this essential feature (MailChimp added multi-user permission levels this year). If you have been using an email provided by the client, give it three weeks or so to ensure that no important messages trickle in before turning off the account.
- Admin access. I can't stress this enough. Depending on the client and the nature of the gig, you may find yourself logging in with admin access on a lot of key systems, cloud-based or otherwise. At all costs, make sure that either your personal access level is changed (if not entirely eliminated) or that the credential on the Admin account is changed as soon as your engagement ends. You don't want the headaches of possible misunderstandings or weird questions that are likely to come if you continue to have admin access.